References
- C. Modi, D. Patel, B. Borisaniya A. Patel & M. Rajarajan. (2013). A Survey on security issues and solutions at different layers of Cloud computing, The Journal of Supercomputing, 62(2), 561-592. DOI : 10.1007/s11227-012-0831-5.
- F. Shajzad. (2014). State of the art survey on cloud computing security. Challenges, approaches and solutions. Procedia Computer Science, 37, 357-362. DOI: 10.1016/j.procs.2014.08.053
- S. Pearson. (2009). Taking account of privacy when designng cloud computing services. In 2009 ICSE Workshop on Software Engineering Challenges of Cloud Computing (pp. 44-52). IEEE. http://www.hpl.hp.com/techreports/2009/HPL-2009-54.pdf
- J. J. Collins. (2015). Online accounting systems: Accounting for cloud security. http://www.journalofaccountancy.com/issues/2015/sep/accounting-sytems-cloud-security.html
- G. R. Miline & M. J. Culnan. (2004). Strategiesofr reducing online privacy risks: Why consumers read (or don't read) online privacy notices, Journal of Interactive marketing, 18(3), 15-29. DOI : 10.1002/dir.20009
- P. Mell & T. Grance. (2011). The NIST definition of cloud computing http://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-145.pdf
- C. Rong, S. T. Nguyen & M. G. Jaatun. (2013). Beyonf lightning: A Survey on security challenges in cloud computing, Computers & Electrical Engineering, 39(1), 47-54. DOI: 10.1016/j.compeleceng.2012.04.015
- E. McCallister, T. Grance & K. A. Scarfone. (2010). Guide to Protecting the Confidentiality of Personally Identifiable Information (PII) (Vol. 800, No. 122). Diane Publishing. https://csrc.nist.gov/publication/nistpubs/800-122/sp800-122.pdf
- A. K. VasanthaAzhagu & J. Gnanasekar. (2016). Cloud Computing Overview, Security Threats and Solutions-A Survey. Proceedings of the International Conference on Informatics and Analytics, Pondicherry, India, August 25-26.
- H. Salcedo. (2014). Google Drive, Dropbox, Box and iCloud reach the top 5 cloud storage security breaches list, Hitachi http://psg.hitachi-solutions.com/credeon/blog/google-drive-droopbox-box-and-icloud-reach-the-top-5-cloud-storage-security-breaches-list
- N. Steinfield. (2016). "I agree to the terms and conditions": (How do users read privacy policies online? An eye-tracking experiment, Computers in Human Behavior, 55, 992-1000. DOI : 10.1016/j.chb.2015.09.038.
- A. Seshagiri. (2013). Claims that Google violates Gmail user privacy, The NewYork Times (October 1). http://www.nytimes.com/interactive/2013/10/02/technology/google-email-case.html
- H. N. Chua, A. Herbland, S. F. Wong & Y. Chang. (2017). Compliance to personal data protection principles: A Study of how organizations frame privacy policy notices, Telematics and Informatics, 34(4), 157-170. DOI : 10.1016/j.tele.2017.01.008.
- K. W. Wu, S. Y. Huang, C. Yen & I. Popova. (2012). The effect of online privacy on consumer privacy concern and trust, Computers in Human Behavior, 28(3), 889-897. DOI : 10.1016/j.chb.2011.12.008
- S. Bradshaw, C. Millard & I. Walden. (2011). Contracts of clouds : Comparisionand analysis of the Terms and Conditions of cloud computing services, International Journal of Law and Information Technology, 19(3), 187-223. DOI : 10.1093/ijlit/ear005
- S. Goel & J. Gangolly. (2012). Beyond the numbers: Mining the annual reports for hidden cues indicative of financial statement fraud, Intelligent Systems in Accounting, Finance & Management 19(2), 75-89. DOI : 10.1002/isaf.1326.
- V. L. Rubin, E. D. Liddy & N. Kando. (2006). Certainty identification in texts: Categorixation model and manual tagging results. In Computing Attitude and Affect in Text: Theory and Applications, 61-76. Dordrecht, The Netherlands: Springer.
- E. Henry. (2006). Market reaction to verval components of earnings press releases: Event study using a predictive algorithm, Journal of Emerging Technologies in Accounting 3(1), 1-19. DOI : 10.2308/jeta.2006.3.1.1.
- H. S. Asay, W. B. Elliott & K. Rennekamp. (2017). Disclosure readability and the sensitivity of invsetors' valuation judgements to outside information, The Accounting Review 92(4), 1-25. DOI : 10.2308/accr-51570.
- R. Chun. (2017). How virtuous global firms say they are: A content analysis of ethical values, Journal of Business Ethics, 155(1), 57-73. DOI : 10.1007/s10551-017-3525-3.
- T. Loughran & B. McDonald. (2014). Measuring readability in financial disclosures, The Journal of Finance, 69(4), 1643-1671. DOI : 10.1111/jofi.12162.